HAMED, E.M.,SEDKY, M.H., (2016). A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime, 5(1), 11-31. Retrieve from https://www.ijisc.comHAMED, E.M., SEDKY, M.H., 2016. A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime 5(1), 11-31. Available from: https://www.ijisc.comE.M. HAMED, M.H. SEDKY, "A High Secured, Cost Effectively E-Voting System," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 11-31, 2016. Available: https://www.ijisc.comHAMED, E.M., SEDKY, M.H., 'A High Secured, Cost Effectively E-Voting System', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 11-31, (2016).HAMED, E.M.,SEDKY, M.H.,: A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime 5 (2016) 11-31. https://www.ijisc.comHAMED, E.M., SEDKY, M.H., (2016), A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime, 5: 11-31. https://www.ijisc.com Citation Format :
BHARDWAJ, A.,PANDEY, K.,CHOPRA, R., (2016). Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime, 5(1), 32-44. Retrieve from https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., 2016. Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime 5(1), 32-44. Available from: https://www.ijisc.comA. BHARDWAJ, K. PANDEY, R. CHOPRA, "Android and iOS Security – An Analysis and Comparison Report," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 32-44, 2016. Available: https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., 'Android and iOS Security – An Analysis and Comparison Report', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 32-44, (2016).BHARDWAJ, A.,PANDEY, K.,CHOPRA, R.,: Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime 5 (2016) 32-44. https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., (2016), Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime, 5: 32-44. https://www.ijisc.com Citation Format :
SAHA, B.,GHOSHAL, D., (2016). A Mixed Modified LBP Approach for the Recognition of Real Life Human Faces. International Journal of Information Security and Cybercrime, 5(1), 45-54. Retrieve from https://www.ijisc.comSAHA, B., GHOSHAL, D., 2016. A Mixed Modified LBP Approach for the Recognition of Real Life Human Faces. International Journal of Information Security and Cybercrime 5(1), 45-54. Available from: https://www.ijisc.comB. SAHA, D. GHOSHAL, "A Mixed Modified LBP Approach for the Recognition of Real Life Human Faces," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 45-54, 2016. Available: https://www.ijisc.comSAHA, B., GHOSHAL, D., 'A Mixed Modified LBP Approach for the Recognition of Real Life Human Faces', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 45-54, (2016).SAHA, B.,GHOSHAL, D.,: A Mixed Modified LBP Approach for the Recognition of Real Life Human Faces. International Journal of Information Security and Cybercrime 5 (2016) 45-54. https://www.ijisc.comSAHA, B., GHOSHAL, D., (2016), A Mixed Modified LBP Approach for the Recognition of Real Life Human Faces. International Journal of Information Security and Cybercrime, 5: 45-54. https://www.ijisc.com Citation Format :
MARCOCI, P.M. (2016). Some Considerations Regarding Fraud Investigation in E-Commerce. International Journal of Information Security and Cybercrime, 5(1), 55-60. Retrieve from https://www.ijisc.comMARCOCI, P.M., 2016. Some Considerations Regarding Fraud Investigation in E-Commerce. International Journal of Information Security and Cybercrime 5(1), 55-60. Available from: https://www.ijisc.comP.M. MARCOCI, "Some Considerations Regarding Fraud Investigation in E-Commerce," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 55-60, 2016. Available: https://www.ijisc.comMARCOCI, P.M., 'Some Considerations Regarding Fraud Investigation in E-Commerce', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 55-60, (2016).MARCOCI, P.M.: Some Considerations Regarding Fraud Investigation in E-Commerce. International Journal of Information Security and Cybercrime 5 (2016) 55-60. https://www.ijisc.comMARCOCI, P.M., (2016), Some Considerations Regarding Fraud Investigation in E-Commerce. International Journal of Information Security and Cybercrime, 5: 55-60. https://www.ijisc.com Citation Format :
GANAR, R.P.,ARDHAPURKAR, S.B., (2016). Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime, 5(1), 61-68. Retrieve from https://www.ijisc.comGANAR, R.P., ARDHAPURKAR, S.B., 2016. Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime 5(1), 61-68. Available from: https://www.ijisc.comR.P. GANAR, S.B. ARDHAPURKAR, "Exploiting Social Network for Forensic Analysis to Predict Civil Unrest," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 61-68, 2016. Available: https://www.ijisc.comGANAR, R.P., ARDHAPURKAR, S.B., 'Exploiting Social Network for Forensic Analysis to Predict Civil Unrest', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 61-68, (2016).GANAR, R.P.,ARDHAPURKAR, S.B.,: Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime 5 (2016) 61-68. https://www.ijisc.comGANAR, R.P., ARDHAPURKAR, S.B., (2016), Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime, 5: 61-68. https://www.ijisc.com Citation Format :
SHARMA, P.,GUPTA, G., (2016). Security Problems in Sensor Network. International Journal of Information Security and Cybercrime, 5(1), 69-74. Retrieve from https://www.ijisc.comSHARMA, P., GUPTA, G., 2016. Security Problems in Sensor Network. International Journal of Information Security and Cybercrime 5(1), 69-74. Available from: https://www.ijisc.comP. SHARMA, G. GUPTA, "Security Problems in Sensor Network," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 69-74, 2016. Available: https://www.ijisc.comSHARMA, P., GUPTA, G., 'Security Problems in Sensor Network', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 69-74, (2016).SHARMA, P.,GUPTA, G.,: Security Problems in Sensor Network. International Journal of Information Security and Cybercrime 5 (2016) 69-74. https://www.ijisc.comSHARMA, P., GUPTA, G., (2016), Security Problems in Sensor Network. International Journal of Information Security and Cybercrime, 5: 69-74. https://www.ijisc.com Citation Format :
FIDA, M.,JOVITH, A.A., (2016). Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5(1), 75-80. Retrieve from https://www.ijisc.comFIDA, M., JOVITH, A.A., 2016. Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5(1), 75-80. Available from: https://www.ijisc.comM. FIDA, A.A. JOVITH, "Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 75-80, 2016. Available: https://www.ijisc.comFIDA, M., JOVITH, A.A., 'Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 75-80, (2016).FIDA, M.,JOVITH, A.A.,: Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5 (2016) 75-80. https://www.ijisc.comFIDA, M., JOVITH, A.A., (2016), Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5: 75-80. https://www.ijisc.com Citation Format :
GAUR, A.,BHARDWAJ, M., (2016). Offline Signature Verification Approaches: A Review. International Journal of Information Security and Cybercrime, 5(1), 81-88. Retrieve from https://www.ijisc.comGAUR, A., BHARDWAJ, M., 2016. Offline Signature Verification Approaches: A Review. International Journal of Information Security and Cybercrime 5(1), 81-88. Available from: https://www.ijisc.comA. GAUR, M. BHARDWAJ, "Offline Signature Verification Approaches: A Review," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 81-88, 2016. Available: https://www.ijisc.comGAUR, A., BHARDWAJ, M., 'Offline Signature Verification Approaches: A Review', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 81-88, (2016).GAUR, A.,BHARDWAJ, M.,: Offline Signature Verification Approaches: A Review. International Journal of Information Security and Cybercrime 5 (2016) 81-88. https://www.ijisc.comGAUR, A., BHARDWAJ, M., (2016), Offline Signature Verification Approaches: A Review. International Journal of Information Security and Cybercrime, 5: 81-88. https://www.ijisc.com Citation Format :